mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-22 12:14:01 +08:00
Merge branch 'support-alu32_arsh'
Jiong Wang says:
====================
BPF_ALU | BPF_ARSH | BPF_* were rejected by commit: 7891a87efc
("bpf: arsh is not supported in 32 bit alu thus reject it"). As explained
in the commit message, this is due to there is no complete support for them
on interpreter and various JIT compilation back-ends.
This patch set is a follow-up which completes the missing bits. This also
pave the way for running bpf program compiled with ALU32 instruction
enabled by specifing -mattr=+alu32 to LLVM for which case there is likely
to have more BPF_ALU | BPF_ARSH insns that will trigger the rejection code.
test_verifier.c is updated accordingly.
I have tested this patch set on x86-64 and NFP, I need help of review and
test on the arch changes (mips/ppc/s390).
Note, there might be merge confict on mips change which is better to be
applied on top of:
commit: 20b880a05f06 ("mips: bpf: fix encoding bug for mm_srlv32_op"),
which is on mips-fixes branch at the moment.
Thanks.
v1->v2:
- Fix ppc implementation bug. Should zero high bits explicitly.
====================
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
This commit is contained in:
commit
6baefa1aa4
@ -157,6 +157,7 @@ Ip_u2u1s3(_slti);
|
||||
Ip_u2u1s3(_sltiu);
|
||||
Ip_u3u1u2(_sltu);
|
||||
Ip_u2u1u3(_sra);
|
||||
Ip_u3u2u1(_srav);
|
||||
Ip_u2u1u3(_srl);
|
||||
Ip_u3u2u1(_srlv);
|
||||
Ip_u3u1u2(_subu);
|
||||
|
@ -371,6 +371,7 @@ enum mm_32a_minor_op {
|
||||
mm_srl32_op = 0x040,
|
||||
mm_srlv32_op = 0x050,
|
||||
mm_sra_op = 0x080,
|
||||
mm_srav_op = 0x090,
|
||||
mm_rotr_op = 0x0c0,
|
||||
mm_lwxs_op = 0x118,
|
||||
mm_addu32_op = 0x150,
|
||||
|
@ -104,6 +104,7 @@ static const struct insn insn_table_MM[insn_invalid] = {
|
||||
[insn_sltiu] = {M(mm_sltiu32_op, 0, 0, 0, 0, 0), RT | RS | SIMM},
|
||||
[insn_sltu] = {M(mm_pool32a_op, 0, 0, 0, 0, mm_sltu_op), RT | RS | RD},
|
||||
[insn_sra] = {M(mm_pool32a_op, 0, 0, 0, 0, mm_sra_op), RT | RS | RD},
|
||||
[insn_srav] = {M(mm_pool32a_op, 0, 0, 0, 0, mm_srav_op), RT | RS | RD},
|
||||
[insn_srl] = {M(mm_pool32a_op, 0, 0, 0, 0, mm_srl32_op), RT | RS | RD},
|
||||
[insn_srlv] = {M(mm_pool32a_op, 0, 0, 0, 0, mm_srlv32_op), RT | RS | RD},
|
||||
[insn_rotr] = {M(mm_pool32a_op, 0, 0, 0, 0, mm_rotr_op), RT | RS | RD},
|
||||
|
@ -171,6 +171,7 @@ static const struct insn insn_table[insn_invalid] = {
|
||||
[insn_sltiu] = {M(sltiu_op, 0, 0, 0, 0, 0), RS | RT | SIMM},
|
||||
[insn_sltu] = {M(spec_op, 0, 0, 0, 0, sltu_op), RS | RT | RD},
|
||||
[insn_sra] = {M(spec_op, 0, 0, 0, 0, sra_op), RT | RD | RE},
|
||||
[insn_srav] = {M(spec_op, 0, 0, 0, 0, srav_op), RS | RT | RD},
|
||||
[insn_srl] = {M(spec_op, 0, 0, 0, 0, srl_op), RT | RD | RE},
|
||||
[insn_srlv] = {M(spec_op, 0, 0, 0, 0, srlv_op), RS | RT | RD},
|
||||
[insn_subu] = {M(spec_op, 0, 0, 0, 0, subu_op), RS | RT | RD},
|
||||
|
@ -61,10 +61,10 @@ enum opcode {
|
||||
insn_mthc0, insn_mthi, insn_mtlo, insn_mul, insn_multu, insn_nor,
|
||||
insn_or, insn_ori, insn_pref, insn_rfe, insn_rotr, insn_sb,
|
||||
insn_sc, insn_scd, insn_sd, insn_sh, insn_sll, insn_sllv,
|
||||
insn_slt, insn_slti, insn_sltiu, insn_sltu, insn_sra, insn_srl,
|
||||
insn_srlv, insn_subu, insn_sw, insn_sync, insn_syscall, insn_tlbp,
|
||||
insn_tlbr, insn_tlbwi, insn_tlbwr, insn_wait, insn_wsbh, insn_xor,
|
||||
insn_xori, insn_yield,
|
||||
insn_slt, insn_slti, insn_sltiu, insn_sltu, insn_sra, insn_srav,
|
||||
insn_srl, insn_srlv, insn_subu, insn_sw, insn_sync, insn_syscall,
|
||||
insn_tlbp, insn_tlbr, insn_tlbwi, insn_tlbwr, insn_wait, insn_wsbh,
|
||||
insn_xor, insn_xori, insn_yield,
|
||||
insn_invalid /* insn_invalid must be last */
|
||||
};
|
||||
|
||||
@ -353,6 +353,7 @@ I_u2u1s3(_slti)
|
||||
I_u2u1s3(_sltiu)
|
||||
I_u3u1u2(_sltu)
|
||||
I_u2u1u3(_sra)
|
||||
I_u3u2u1(_srav)
|
||||
I_u2u1u3(_srl)
|
||||
I_u3u2u1(_srlv)
|
||||
I_u2u1u3(_rotr)
|
||||
|
@ -854,6 +854,7 @@ static int build_one_insn(const struct bpf_insn *insn, struct jit_ctx *ctx,
|
||||
case BPF_ALU | BPF_MOD | BPF_X: /* ALU_REG */
|
||||
case BPF_ALU | BPF_LSH | BPF_X: /* ALU_REG */
|
||||
case BPF_ALU | BPF_RSH | BPF_X: /* ALU_REG */
|
||||
case BPF_ALU | BPF_ARSH | BPF_X: /* ALU_REG */
|
||||
src = ebpf_to_mips_reg(ctx, insn, src_reg_no_fp);
|
||||
dst = ebpf_to_mips_reg(ctx, insn, dst_reg);
|
||||
if (src < 0 || dst < 0)
|
||||
@ -913,6 +914,9 @@ static int build_one_insn(const struct bpf_insn *insn, struct jit_ctx *ctx,
|
||||
case BPF_RSH:
|
||||
emit_instr(ctx, srlv, dst, dst, src);
|
||||
break;
|
||||
case BPF_ARSH:
|
||||
emit_instr(ctx, srav, dst, dst, src);
|
||||
break;
|
||||
default:
|
||||
pr_err("ALU_REG NOT HANDLED\n");
|
||||
return -EINVAL;
|
||||
|
@ -342,6 +342,8 @@
|
||||
#define PPC_INST_SLW 0x7c000030
|
||||
#define PPC_INST_SLD 0x7c000036
|
||||
#define PPC_INST_SRW 0x7c000430
|
||||
#define PPC_INST_SRAW 0x7c000630
|
||||
#define PPC_INST_SRAWI 0x7c000670
|
||||
#define PPC_INST_SRD 0x7c000436
|
||||
#define PPC_INST_SRAD 0x7c000634
|
||||
#define PPC_INST_SRADI 0x7c000674
|
||||
|
@ -152,6 +152,10 @@
|
||||
___PPC_RS(a) | ___PPC_RB(s))
|
||||
#define PPC_SRW(d, a, s) EMIT(PPC_INST_SRW | ___PPC_RA(d) | \
|
||||
___PPC_RS(a) | ___PPC_RB(s))
|
||||
#define PPC_SRAW(d, a, s) EMIT(PPC_INST_SRAW | ___PPC_RA(d) | \
|
||||
___PPC_RS(a) | ___PPC_RB(s))
|
||||
#define PPC_SRAWI(d, a, i) EMIT(PPC_INST_SRAWI | ___PPC_RA(d) | \
|
||||
___PPC_RS(a) | __PPC_SH(i))
|
||||
#define PPC_SRD(d, a, s) EMIT(PPC_INST_SRD | ___PPC_RA(d) | \
|
||||
___PPC_RS(a) | ___PPC_RB(s))
|
||||
#define PPC_SRAD(d, a, s) EMIT(PPC_INST_SRAD | ___PPC_RA(d) | \
|
||||
|
@ -529,9 +529,15 @@ static int bpf_jit_build_body(struct bpf_prog *fp, u32 *image,
|
||||
if (imm != 0)
|
||||
PPC_SRDI(dst_reg, dst_reg, imm);
|
||||
break;
|
||||
case BPF_ALU | BPF_ARSH | BPF_X: /* (s32) dst >>= src */
|
||||
PPC_SRAW(dst_reg, dst_reg, src_reg);
|
||||
goto bpf_alu32_trunc;
|
||||
case BPF_ALU64 | BPF_ARSH | BPF_X: /* (s64) dst >>= src */
|
||||
PPC_SRAD(dst_reg, dst_reg, src_reg);
|
||||
break;
|
||||
case BPF_ALU | BPF_ARSH | BPF_K: /* (s32) dst >>= imm */
|
||||
PPC_SRAWI(dst_reg, dst_reg, imm);
|
||||
goto bpf_alu32_trunc;
|
||||
case BPF_ALU64 | BPF_ARSH | BPF_K: /* (s64) dst >>= imm */
|
||||
if (imm != 0)
|
||||
PPC_SRADI(dst_reg, dst_reg, imm);
|
||||
|
@ -821,10 +821,22 @@ static noinline int bpf_jit_insn(struct bpf_jit *jit, struct bpf_prog *fp, int i
|
||||
/*
|
||||
* BPF_ARSH
|
||||
*/
|
||||
case BPF_ALU | BPF_ARSH | BPF_X: /* ((s32) dst) >>= src */
|
||||
/* sra %dst,%dst,0(%src) */
|
||||
EMIT4_DISP(0x8a000000, dst_reg, src_reg, 0);
|
||||
EMIT_ZERO(dst_reg);
|
||||
break;
|
||||
case BPF_ALU64 | BPF_ARSH | BPF_X: /* ((s64) dst) >>= src */
|
||||
/* srag %dst,%dst,0(%src) */
|
||||
EMIT6_DISP_LH(0xeb000000, 0x000a, dst_reg, dst_reg, src_reg, 0);
|
||||
break;
|
||||
case BPF_ALU | BPF_ARSH | BPF_K: /* ((s32) dst >> imm */
|
||||
if (imm == 0)
|
||||
break;
|
||||
/* sra %dst,imm(%r0) */
|
||||
EMIT4_DISP(0x8a000000, dst_reg, REG_0, imm);
|
||||
EMIT_ZERO(dst_reg);
|
||||
break;
|
||||
case BPF_ALU64 | BPF_ARSH | BPF_K: /* ((s64) dst) >>= imm */
|
||||
if (imm == 0)
|
||||
break;
|
||||
|
@ -2382,6 +2382,49 @@ static int neg_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int __ashr_imm(struct nfp_prog *nfp_prog, u8 dst, u8 shift_amt)
|
||||
{
|
||||
/* Set signedness bit (MSB of result). */
|
||||
emit_alu(nfp_prog, reg_none(), reg_a(dst), ALU_OP_OR, reg_imm(0));
|
||||
emit_shf(nfp_prog, reg_both(dst), reg_none(), SHF_OP_ASHR, reg_b(dst),
|
||||
SHF_SC_R_SHF, shift_amt);
|
||||
wrp_immed(nfp_prog, reg_both(dst + 1), 0);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int ashr_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
||||
{
|
||||
const struct bpf_insn *insn = &meta->insn;
|
||||
u64 umin, umax;
|
||||
u8 dst, src;
|
||||
|
||||
dst = insn->dst_reg * 2;
|
||||
umin = meta->umin_src;
|
||||
umax = meta->umax_src;
|
||||
if (umin == umax)
|
||||
return __ashr_imm(nfp_prog, dst, umin);
|
||||
|
||||
src = insn->src_reg * 2;
|
||||
/* NOTE: the first insn will set both indirect shift amount (source A)
|
||||
* and signedness bit (MSB of result).
|
||||
*/
|
||||
emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_b(dst));
|
||||
emit_shf_indir(nfp_prog, reg_both(dst), reg_none(), SHF_OP_ASHR,
|
||||
reg_b(dst), SHF_SC_R_SHF);
|
||||
wrp_immed(nfp_prog, reg_both(dst + 1), 0);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int ashr_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
||||
{
|
||||
const struct bpf_insn *insn = &meta->insn;
|
||||
u8 dst = insn->dst_reg * 2;
|
||||
|
||||
return __ashr_imm(nfp_prog, dst, insn->imm);
|
||||
}
|
||||
|
||||
static int shl_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
||||
{
|
||||
const struct bpf_insn *insn = &meta->insn;
|
||||
@ -3286,6 +3329,8 @@ static const instr_cb_t instr_cb[256] = {
|
||||
[BPF_ALU | BPF_DIV | BPF_K] = div_imm,
|
||||
[BPF_ALU | BPF_NEG] = neg_reg,
|
||||
[BPF_ALU | BPF_LSH | BPF_K] = shl_imm,
|
||||
[BPF_ALU | BPF_ARSH | BPF_X] = ashr_reg,
|
||||
[BPF_ALU | BPF_ARSH | BPF_K] = ashr_imm,
|
||||
[BPF_ALU | BPF_END | BPF_X] = end_reg32,
|
||||
[BPF_LD | BPF_IMM | BPF_DW] = imm_ld8,
|
||||
[BPF_LD | BPF_ABS | BPF_B] = data_ld1,
|
||||
|
@ -933,32 +933,34 @@ EXPORT_SYMBOL_GPL(__bpf_call_base);
|
||||
#define BPF_INSN_MAP(INSN_2, INSN_3) \
|
||||
/* 32 bit ALU operations. */ \
|
||||
/* Register based. */ \
|
||||
INSN_3(ALU, ADD, X), \
|
||||
INSN_3(ALU, SUB, X), \
|
||||
INSN_3(ALU, AND, X), \
|
||||
INSN_3(ALU, OR, X), \
|
||||
INSN_3(ALU, LSH, X), \
|
||||
INSN_3(ALU, RSH, X), \
|
||||
INSN_3(ALU, XOR, X), \
|
||||
INSN_3(ALU, MUL, X), \
|
||||
INSN_3(ALU, MOV, X), \
|
||||
INSN_3(ALU, DIV, X), \
|
||||
INSN_3(ALU, MOD, X), \
|
||||
INSN_3(ALU, ADD, X), \
|
||||
INSN_3(ALU, SUB, X), \
|
||||
INSN_3(ALU, AND, X), \
|
||||
INSN_3(ALU, OR, X), \
|
||||
INSN_3(ALU, LSH, X), \
|
||||
INSN_3(ALU, RSH, X), \
|
||||
INSN_3(ALU, XOR, X), \
|
||||
INSN_3(ALU, MUL, X), \
|
||||
INSN_3(ALU, MOV, X), \
|
||||
INSN_3(ALU, ARSH, X), \
|
||||
INSN_3(ALU, DIV, X), \
|
||||
INSN_3(ALU, MOD, X), \
|
||||
INSN_2(ALU, NEG), \
|
||||
INSN_3(ALU, END, TO_BE), \
|
||||
INSN_3(ALU, END, TO_LE), \
|
||||
/* Immediate based. */ \
|
||||
INSN_3(ALU, ADD, K), \
|
||||
INSN_3(ALU, SUB, K), \
|
||||
INSN_3(ALU, AND, K), \
|
||||
INSN_3(ALU, OR, K), \
|
||||
INSN_3(ALU, LSH, K), \
|
||||
INSN_3(ALU, RSH, K), \
|
||||
INSN_3(ALU, XOR, K), \
|
||||
INSN_3(ALU, MUL, K), \
|
||||
INSN_3(ALU, MOV, K), \
|
||||
INSN_3(ALU, DIV, K), \
|
||||
INSN_3(ALU, MOD, K), \
|
||||
INSN_3(ALU, ADD, K), \
|
||||
INSN_3(ALU, SUB, K), \
|
||||
INSN_3(ALU, AND, K), \
|
||||
INSN_3(ALU, OR, K), \
|
||||
INSN_3(ALU, LSH, K), \
|
||||
INSN_3(ALU, RSH, K), \
|
||||
INSN_3(ALU, XOR, K), \
|
||||
INSN_3(ALU, MUL, K), \
|
||||
INSN_3(ALU, MOV, K), \
|
||||
INSN_3(ALU, ARSH, K), \
|
||||
INSN_3(ALU, DIV, K), \
|
||||
INSN_3(ALU, MOD, K), \
|
||||
/* 64 bit ALU operations. */ \
|
||||
/* Register based. */ \
|
||||
INSN_3(ALU64, ADD, X), \
|
||||
@ -1137,6 +1139,12 @@ select_insn:
|
||||
DST = (u64) (u32) insn[0].imm | ((u64) (u32) insn[1].imm) << 32;
|
||||
insn++;
|
||||
CONT;
|
||||
ALU_ARSH_X:
|
||||
DST = (u64) (u32) ((*(s32 *) &DST) >> SRC);
|
||||
CONT;
|
||||
ALU_ARSH_K:
|
||||
DST = (u64) (u32) ((*(s32 *) &DST) >> IMM);
|
||||
CONT;
|
||||
ALU64_ARSH_X:
|
||||
(*(s64 *) &DST) >>= SRC;
|
||||
CONT;
|
||||
|
@ -3649,11 +3649,6 @@ static int check_alu_op(struct bpf_verifier_env *env, struct bpf_insn *insn)
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
if (opcode == BPF_ARSH && BPF_CLASS(insn->code) != BPF_ALU64) {
|
||||
verbose(env, "BPF_ARSH not supported for 32 bit ALU\n");
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
if ((opcode == BPF_LSH || opcode == BPF_RSH ||
|
||||
opcode == BPF_ARSH) && BPF_SRC(insn->code) == BPF_K) {
|
||||
int size = BPF_CLASS(insn->code) == BPF_ALU64 ? 64 : 32;
|
||||
|
@ -721,8 +721,18 @@ static struct bpf_test tests[] = {
|
||||
BPF_ALU32_IMM(BPF_ARSH, BPF_REG_0, 5),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.result = REJECT,
|
||||
.errstr = "unknown opcode c4",
|
||||
.result = ACCEPT,
|
||||
.retval = 0,
|
||||
},
|
||||
{
|
||||
"arsh32 on imm 2",
|
||||
.insns = {
|
||||
BPF_LD_IMM64(BPF_REG_0, 0x1122334485667788),
|
||||
BPF_ALU32_IMM(BPF_ARSH, BPF_REG_0, 7),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.result = ACCEPT,
|
||||
.retval = -16069393,
|
||||
},
|
||||
{
|
||||
"arsh32 on reg",
|
||||
@ -732,8 +742,19 @@ static struct bpf_test tests[] = {
|
||||
BPF_ALU32_REG(BPF_ARSH, BPF_REG_0, BPF_REG_1),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.result = REJECT,
|
||||
.errstr = "unknown opcode cc",
|
||||
.result = ACCEPT,
|
||||
.retval = 0,
|
||||
},
|
||||
{
|
||||
"arsh32 on reg 2",
|
||||
.insns = {
|
||||
BPF_LD_IMM64(BPF_REG_0, 0xffff55667788),
|
||||
BPF_MOV64_IMM(BPF_REG_1, 15),
|
||||
BPF_ALU32_REG(BPF_ARSH, BPF_REG_0, BPF_REG_1),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
.result = ACCEPT,
|
||||
.retval = 43724,
|
||||
},
|
||||
{
|
||||
"arsh64 on imm",
|
||||
|
Loading…
Reference in New Issue
Block a user